IJSMT Journal

International Journal of Science, Strategic Management and Technology

An International, Peer-Reviewed, Open Access Scholarly Journal Indexed in recognized academic databases · DOI via Crossref The journal adheres to established scholarly publishing, peer-review, and research ethics guidelines set by the UGC

ISSN: 3108-1762 (Online)
webp (1)

Plagiarism Passed
Peer reviewed
Open Access

BEYOND STATIC DECOYS: A POSITION PAPER ON REINFORCEMENT-LEARNING- DRIVEN HONEYGAN ECOSYSTEMS WITH BLOCKCHAIN-ANCHORED AUDIT TRAILS FOR INDUSTRY 5.0 CYBER DEFENSE

AUTHORS:
Rohit Kumar
Shallu Hassija
Mentor
Affiliation

Department of Computer Application Echelon Institute of Technology, Faridabad Affiliated to Guru Gobind Singh Indraprastha University New Delhi, India

CC BY 4.0 License:
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract

Recent work on Generative Adversarial Networks for honeypot generation, most notably the HoneyGAN Pots framework, has shown that decoys produced by a learned generator can evade existing honeypot detectors more reliably than hand-crafted ones. That result is encouraging, but it is only a first step. A trained generator still produces decoys that are static after training: it does not learn from how attackers actually behave once the decoys are deployed, it provides no tamper-proof record of what it generated, and it assumes a class of compute resources that does not exist on industrial edge nodes. This paper is a position paper that takes the future-work agenda outlined by Gabrys et al. and develops it into a concrete research design. We propose an integrated framework, HoneyGAN+, that couples a conditional GAN to a reinforcement-learning policy trained on observed attacker engagement, anchors every generated decoy on a permissioned blockchain to give responders a verifiable audit trail, and uses knowledge distillation together with federated learning to push inference onto resource-constrained Industry 5.0 endpoints. We further argue that individual decoys should be replaced by coordinated multi-agent ecosystems whose internal references are mutually consistent, and we propose a standardized evaluation pipeline (detection resistance, engagement, longevity, and intelligence value) to make claims comparable across studies. The paper also discusses dual-use risks and a governance model that, in our view, ought to be developed before broad deployment rather than after. We are explicit throughout: the contribution is a research design with enough technical detail to support implementation, not a fully built and benchmarked system.

Keywords
Article Metrics
Article Views
53
PDF Downloads
2
HOW TO CITE
APA

MLA

Chicago

Copy

Kumar, R. & Hassija, S. (2026). Beyond Static Decoys: A Position Paper on Reinforcement-Learning- Driven Honeygan Ecosystems with Blockchain-Anchored Audit Trails for Industry 5.0 Cyber Defense. International Journal of Science, Strategic Management and Technology, 02(05). https://doi.org/10.55041/ijsmt.v2i5.247

Kumar, Rohit, and Shallu Hassija. "Beyond Static Decoys: A Position Paper on Reinforcement-Learning- Driven Honeygan Ecosystems with Blockchain-Anchored Audit Trails for Industry 5.0 Cyber Defense." International Journal of Science, Strategic Management and Technology, vol. 02, no. 05, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i5.247.

Kumar, Rohit, and Shallu Hassija. "Beyond Static Decoys: A Position Paper on Reinforcement-Learning- Driven Honeygan Ecosystems with Blockchain-Anchored Audit Trails for Industry 5.0 Cyber Defense." International Journal of Science, Strategic Management and Technology 02, no. 05 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i5.247.

References
1.Gabrys, C. Silva, and M. Bilinski, "HoneyGAN Pots: Using generative adversarial networks to generate honeypot configurations," in Proc. 2nd Int. Workshop on Adaptive Cyber Defense, 2024.

2.Zhang et al., "MMHP-GAN: Mimicry honeypot feature generation using generative adversarial networks," Chinese Journal of Network and Information Security, vol. 10, no. 2, pp. 45–59, 2024.

3.Ndayipfukamiye et al., "Generative adversarial networks for adversarial defense in cybersecurity: A systematic review," Journal of Cybersecurity Research, 2025.

4.Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, and Y. Bengio, "Generative adversarial nets," in Advances in Neural Information Processing Systems, vol. 27, 2014.

5.Biggio and F. Roli, "Wild patterns: Ten years after the rise of adversarial machine learning," Pattern Recognition, vol. 84, pp. 317–331, 2018.

6.Salimans, I. Goodfellow, W. Zaremba, V. Cheung,Radford, and X. Chen, "Improved techniques for training GANs," in Advances in Neural Information Processing Systems, vol. 29, 2016.

7.Mirza and S. Osindero, "Conditional generative adversarial nets," arXiv preprint arXiv:1411.1784, 2014.

8.ENISA, "Threat landscape report: IoT and Industry 4.0/5.0 attack-surface trends," European Union Agency for Cybersecurity, Tech. Rep., 2023.

9.Gulrajani, F. Ahmed, M. Arjovsky, V. Dumoulin, and A. Courville, "Improved training of Wasserstein GANs," in Advances in Neural Information Processing Systems, vol. 30, 2017.

10.Mnih et al., "Human-level control through deep reinforcement learning," Nature, vol. 518, no. 7540,529–533, 2015.
Ethics and Compliance
✓ All ethical standards met
This article has undergone plagiarism screening and double-blind peer review. Editorial policies have been followed. Authors retain copyright under CC BY-NC 4.0 license. The research complies with ethical standards and institutional guidelines.
Indexed In
Similar Articles
Shapawng Yawng Manu Poi: It’s Historical and Cultural Importance of the Festival Among the Singpho Community
string(14) "Arpita Dowarah" Dowarah, A.
(2026)
DOI: 10.55041/ijsmt.v2i3.266
Spending Behaviour Among College Student
string(19) "Panggunba Wairokpam" Wairokpam, P.et al.
(2026)
DOI: 10.55041/ijsmt.v2i4.442
AI-Enabled Fake News Detection using BERT Language Model and Light GBM Classifier
string(16) "Roshan D. Warade" Warade, R. D.
(2026)
DOI: 10.55041/ijsmt.v2i5.336
Scroll to Top